A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting

نویسندگان

  • Wen-Shenq Juang
  • Chin-Laung Lei
  • Horng-Twu Liaw
چکیده

In this paper, we propose a robust and verifiable multi-authority secret voting scheme which meets the requirements of large-scale general elections. This scheme uses a uniquely blind threshold signature scheme to get blind threshold electronic votes such that any voter can abstain from voting after the registration phase. It also uses the threshold cryptosystem to guarantee fairness among the candidates’ campaigns and to provide a mechanism for ensuring that any voter can make an open objection to the tally if his vote has not been published. In this scheme, the computations among voters are independent and voters only have to send an anonymous message to the counter after the registration phase. This scheme preserves the privacy of a voter from the counter, administrators, scrutineers and other voters. Completeness, robustness and verifiability of the voting process are ensured and hence no one can produce a false tally or corrupt or disrupt the election.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coercion-Resistant Electronic Elections with Write-In Candidates

It is often argued in the e-voting community that in the presence of write-in candidates, forced abstention attacks are always possible. Therefore, write-in candidates are often excluded in existing definitions of coercion-resistance arguing that those definitions cannot be achieved by write-in supporting schemes. This is only true if the tally is made public directly. Coercionresistance may we...

متن کامل

A Modification of Punchscan: Trust Distribution

In IAVoSSWorkshop On Trustworthy Elections (WOTE 2006) two papers depicted “Punchscan”, a hybrid paper-electronic voting protocol invented by David Chaum. The scheme is verifiable and effective, but it is managed by a single Election Authority, which must be trusted with voters’ privacy: the Election Authority holds secret information that allows to link a vote from the final bulletin board wit...

متن کامل

Who Counts Your Votes?

Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best method of avoiding vote rigging, recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. It is a goal of this paper to describe a voting system...

متن کامل

Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been able to cast a fully secret ballot in a verifiable way, and the first time a verifiable voting system has been used to collect remote votes in...

متن کامل

Multi-Autority Secret-Ballot Elections with Linear Work

We present new cryptographic protocols for multi-authority secret ballot elections that guarantee privacy, robustness, and universal verifiability. Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damg̊ard and Schoenmakers, and the verifiable secret sharing scheme of Pedersen, reduce the work required by the voter or ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Comput. J.

دوره 45  شماره 

صفحات  -

تاریخ انتشار 2002